ruleprocessorY

Rule processor

Tool to process and transform wordlists by applying complex rules for password cracking

Rule Processor Y is a next-gen Rule processor with complex multibyte character support built to support Hashcat

GitHub

30 stars
2 watching
5 forks
Language: C++
last commit: 19 days ago
Linked from 1 awesome list

cybersecurityhashcathashcat-rulesjohntheripperjtrmdxfindpassword-analysispassword-cracking

Backlinks from these awesome lists:

Related projects:

Repository Description Stars
0xvavaldi/gramify Analyzes text data to extract patterns of words or characters for password cracking and analysis purposes. 28
n0kovo/hashcat-rules-collection A collection of pre-defined rules for password cracking and wordlist processing using the Hashcat tool 77
xfox64x/hashcat-stuffs A collection of tools and scripts designed to aid in password cracking using the Hashcat software 50
nyxgeek/nyxgeek-rules Custom password cracking rules for Hashcat and John the Ripper 77
clem9669/hashcat-rule Provides pre-defined rules for cracking password hashes with hashcat and john. 405
neo23x0/rules A centralized repository of Yara rules for detecting malware and other malicious activities. 10
rarecoil/pantagrule A collection of optimized hashcat rules generated from real-world password compromise data. 390
avast/yaramod A C++ library for parsing and generating YARA rulesets. 120
bnbdr/ida-yara-processor A tool that processes and executes compiled YARA rules within an IDA disassembler environment. 29
zhaber/grules A rule engine for data preprocessing written in Groovy. 37
d4vinci/elpscrk A password generator tool based on user profiling and statistics 788
nsakey/nsa-rules A collection of pre-defined rules and masks for password cracking using hashcat. 528
timbo05sec/autocrack Automates cracking of hashed passwords using Hashcat with customizable rules and wordlists 108
silascutler/virustotaltools Tools for interacting with Virus Total's Yara rule management system. 35
vectrathreatlab/reyara A set of Yara rules designed to simplify the process of reverse engineering malware by providing pre-defined patterns and signatures. 19